CVE-2012-2957 - Multiple Script language Parameter Path Traversal Remote File Access
Symantec Web Gateway contains a flaw that allows a local attacker to traverse outside of a restricted path. The issue is due to the spywall/languageTest.php
and /spywall/download_file.php
scripts not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the 'language
' parameter. This directory traversal attack would allow the attacker to access an arbitrary file. These can be used to include arbitrary PHP files (i.e. Local File Inclusion), but without a way to upload or modify PHP content on the system, they cannot be used for privilege escalation.
CVE-2012-2961 - /spywall/search.php value Parameter SQL Injection
Symantec Web Gateway contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the /spywall/search.php
script not properly sanitizing user-supplied input to the 'value
' parameter, before being passed to the includes/dbutils.php
script. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
CVE-2012-2977 - /spywall/temppassword.php Arbitrary User Password Manipulation
Symantec Web Gateway contains a flaw related to the /spywall/temppassword.php
script in the management console that is triggered when the program fails to properly sanitize user supplied input. This may allow a remote attacker to change the password of an arbitrary user.
CVE-2012-2976 - Multiple Script Remote Command Execution
#1 Symantec Web Gateway (SWG) contains a flaw in the management console. The issue is triggered when an attacker sends a specially crafted Content-Type header in a POST request to the /spywall/previewBlocked.php
or /spywall/previewInfected.php
scripts. With a specially crafted request, a remote attacker can execute arbitrary commands with the privileges of the web server.
#2 Symantec Web Gateway contains a flaw that is triggered when input is not properly sanitized before being used by the 'filename
' parameter in the management console. This may allow a remote attacker to execute arbitrary shell commands.
#3 Symantec Web Gateway (SWG) contains a flaw that is triggered when input is not properly sanitized before being used by the 'ip
' parameter of the fromha.php
script in the management console. This may allow a remote authenticated attacker to execute arbitrary shell commands. Note that HTTP Basic Authentication is used to protect this page and the system has no credentials configured by default. However, by chaining this with the associated local file inclusion vulnerability, the authentication check is bypassed and the fromha.php
script can be called remotely.